Internet Security
-
-
Quality Assurance + Cryptography + Hacking
- Auteur(s): Solis Tech
- Narrateur(s): Millian Quinteros
- Durée: 4 h et 30 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
Is quality assurance what you want to learn? Always wondered how one becomes a better software developer? Does it interest you how to achieve this quickly? Purchase Quality Assurance to discover everything you need to know about testing and software quality!
-
Quality Assurance + Cryptography + Hacking
- Narrateur(s): Millian Quinteros
- Durée: 4 h et 30 min
- Date de publication: 2016-06-28
- Langue: Anglais
- Purchase Quality Assurance to discover everything you need to know about testing and software quality....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
18,74 $ ou gratuit avec l'essai de 30 jours
-
-
-
The Reign of Botnets
- Defending Against Abuses, Bots and Fraud on the Internet
- Auteur(s): David Senecal
- Narrateur(s): Bob Johnson
- Durée: 8 h et 44 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
In The Reign of Botnets, fraud and bot detection expert David Senecal delivers a timely and incisive presentation of the contemporary bot threat landscape and the latest defense strategies used by leading companies to protect themselves. The author uses plain language to lift the veil on bots and fraud, making a topic critical to your website's security easy to understand and even easier to implement.
-
The Reign of Botnets
- Defending Against Abuses, Bots and Fraud on the Internet
- Narrateur(s): Bob Johnson
- Durée: 8 h et 44 min
- Date de publication: 2024-08-27
- Langue: Anglais
-
In The Reign of Botnets, fraud and bot detection expert David Senecal delivers a timely and incisive presentation of the contemporary bot threat landscape and the latest defense strategies used by leading companies to protect themselves.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
27,83 $ ou gratuit avec l'essai de 30 jours
-
-
-
We Have Root
- Even More Advice from Schneier on Security
- Auteur(s): Bruce Schneier
- Narrateur(s): Graham Rowat
- Durée: 10 h et 53 min
- Version intégrale
-
Au global2
-
Performance2
-
Histoire2
In his latest collection of essays, security expert Bruce Schneier tackles a range of cybersecurity, privacy, and real-world security issues ripped from the headlines. Essays cover the ever-expanding role of technology in national security, war, transportation, the Internet of Things, elections, and more. Throughout, he challenges the status quo with a call for leaders, voters, and consumers to make better security and privacy decisions and investments.
-
We Have Root
- Even More Advice from Schneier on Security
- Narrateur(s): Graham Rowat
- Durée: 10 h et 53 min
- Date de publication: 2019-11-08
- Langue: Anglais
-
In his latest collection of essays, security expert Bruce Schneier tackles a range of cybersecurity, privacy, and real-world security issues ripped from the headlines. Essays cover the ever-expanding role of technology in national security, war, transportation, and more....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
28,95 $ ou gratuit avec l'essai de 30 jours
-
-
-
Click with Caution
- 10 Online Red Flags That Scream ‘Scam!’ (Con Men, Scams, Phishing and Other Disgusting Practices and How to Get Ahead of Them, Book 2)
- Auteur(s): Alsden Kier
- Narrateur(s): stephen plaushin
- Durée: 1 h et 41 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
The internet has transformed our world in amazing ways. With just a few clicks, we can talk to friends on the other side of the globe, discover new music, explore our favorite hobbies, shop for just about anything, and even take entire college courses from the comfort of our couch. It’s no exaggeration to say that the internet is one of the greatest tools ever invented. But just like in the real world, not everyone you meet online has good intentions. Hidden among the games, chats, and cute cat videos are people who spend their time trying to trick others.
-
Click with Caution
- 10 Online Red Flags That Scream ‘Scam!’ (Con Men, Scams, Phishing and Other Disgusting Practices and How to Get Ahead of Them, Book 2)
- Narrateur(s): stephen plaushin
- Série: Con Men, Scams, Phishing and other Disgusting Practices and How to Get Ahead of Them, Livre 2
- Durée: 1 h et 41 min
- Date de publication: 2025-06-03
- Langue: Anglais
-
The internet has transformed our world in amazing ways. With just a few clicks, we can talk to friends on the other side of the globe, discover new music, explore our favorite hobbies, shop for just about anything, and even take entire college courses from the comfort of our couch.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
8,71 $ ou gratuit avec l'essai de 30 jours
-
-
-
Hidden in Plain Sight
- 10 Subtle Clues That Text or Email Is a Phishing Scam
- Auteur(s): Alsden Keir
- Narrateur(s): Darren Guido
- Durée: 1 h et 20 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
Every day, we send and receive countless messages—emails from work, reminders from banks, shipping updates from online stores, and texts from friends. Communicating through screens has become so common that most of us don’t even think twice before opening a message, clicking a link, or responding to a notification. But in that sea of normal communication lies something much more dangerous: messages designed to trick you, to make you give away your passwords, financial details, or other private information. These scams often come hidden in the very tools we trust most—email and text.
-
Hidden in Plain Sight
- 10 Subtle Clues That Text or Email Is a Phishing Scam
- Narrateur(s): Darren Guido
- Durée: 1 h et 20 min
- Date de publication: 2025-05-27
- Langue: Anglais
-
Every day, we send and receive countless messages—emails from work, reminders from banks, shipping updates from online stores, and texts from friends.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
8,71 $ ou gratuit avec l'essai de 30 jours
-
-
-
Cybersecurity Is Everybody's Business
- Solve the Security Puzzle for Your Small Business and Home
- Auteur(s): Scott N. Schober, Craig W. Schober
- Narrateur(s): Stephen Bowlby
- Durée: 7 h et 15 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
Since the publication of his first book Hacked Again, Scott Schober has dedicated himself to educating anyone who would listen by telling his own story of being hacked in the hope that others can learn from his own mistakes. Now, joined by his brother Craig, the two have set their sights on the biggest target of all: small businesses. Throughout Cybersecurity Is Everybody's Business, Scott and Craig contextualize the impact of these cyber attacks on your small business and daily lives to provide expert insight and a plan of attack for fending off future security breaches.
-
Cybersecurity Is Everybody's Business
- Solve the Security Puzzle for Your Small Business and Home
- Narrateur(s): Stephen Bowlby
- Durée: 7 h et 15 min
- Date de publication: 2019-10-22
- Langue: Anglais
-
Since the publication of his first book Hacked Again, Scott Schober has dedicated himself to educating anyone who would listen by telling his own story of being hacked in the hope that others can learn from his own mistakes....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
25,00 $ ou gratuit avec l'essai de 30 jours
-
-
-
Understanding Cryptography
- The Basic Science of Keeping Secrets Safe
- Auteur(s): Revin Laxtor
- Narrateur(s): Alejandro Cordoba
- Durée: 1 h et 53 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
Cryptography is the science of keeping information secret and secure. It’s one of the oldest and most fascinating fields in human history. Long before computers, satellites, and smartphones, people were using secret codes to share information that had to be kept away from prying eyes. From ancient Egyptian hieroglyphics to encrypted war plans during World War II, the desire to keep secrets safe has always been a part of human life. But cryptography isn’t just a subject for history books or spy movies. Today, cryptography is all around us.
-
Understanding Cryptography
- The Basic Science of Keeping Secrets Safe
- Narrateur(s): Alejandro Cordoba
- Durée: 1 h et 53 min
- Date de publication: 2025-07-14
- Langue: Anglais
-
Cryptography is the science of keeping information secret and secure. It’s one of the oldest and most fascinating fields in human history. Long before computers, satellites, and smartphones, people were using secret codes to share information that had to be kept away from prying eyes.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
8,71 $ ou gratuit avec l'essai de 30 jours
-
-
-
Darknet
- Schmuddelecke oder letzter Freiraum des Internets?
- Auteur(s): Kai Laufen
- Narrateur(s): Isabelle Demey, Martin Ruthenberg
- Durée: 27 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
Die Internetseite Silk Road vertreibt Cannabis, Kokain und Amphetamine. Die Webseite ist Teil des sogenannten Darknets, also eines weitläufigen Bereichs des Internets, das nicht jedem unbedarften Nutzer zugänglich ist. Denn viele Darknet-Seiten sind nur für eingeladene Mitglieder oder über eine spezielle Technik erreichbar: TOR.
-
Darknet
- Schmuddelecke oder letzter Freiraum des Internets?
- Narrateur(s): Isabelle Demey, Martin Ruthenberg
- Durée: 27 min
- Date de publication: 2014-02-21
- Langue: Allemand
- Die Internetseite Silk Road vertreibt Cannabis, Kokain und Amphetamine. Die Webseite ist Teil des sogenannten Darknets...
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
2,31 $ ou gratuit avec l'essai de 30 jours
-
-
-
To Catch a Predator
- Protecting Your Kids from Online Enemies Already in Your Home
- Auteur(s): Chris Hansen
- Narrateur(s): Todd McLaren
- Durée: 8 h et 28 min
- Version intégrale
-
Au global1
-
Performance1
-
Histoire1
In his book To Catch a Predator, Chris Hansen, the on-air correspondent for one of Dateline's most successful series, looks deeper into the world of child predators. The book expands beyond the Dateline series to include more commentary from psychological and criminal experts about the origins and methods of child predators, and includes substantive advice for both parents and children on how to protect kids who use the Internet.
-
To Catch a Predator
- Protecting Your Kids from Online Enemies Already in Your Home
- Narrateur(s): Todd McLaren
- Durée: 8 h et 28 min
- Date de publication: 2007-05-23
- Langue: Anglais
- In his book To Catch a Predator, Chris Hansen, the on-air correspondent for one of Dateline's most successful series, looks deeper into the world of child predators....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
20,04 $ ou gratuit avec l'essai de 30 jours
-
-
-
The Future of Reputation
- Gossip, Rumor, and Privacy on the Internet
- Auteur(s): Daniel J. Solove
- Narrateur(s): Jeff Wilson
- Durée: 8 h et 24 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
This engrossing book explores the profound implications of personal information on the Internet, preserved forever even if it is false, biased, or humiliating. Brimming with examples of online gossip, slander, and rumor, the book discusses the tensions between privacy and free speech and proposes how to balance the two. What information about you is on the Internet?
-
The Future of Reputation
- Gossip, Rumor, and Privacy on the Internet
- Narrateur(s): Jeff Wilson
- Durée: 8 h et 24 min
- Date de publication: 2010-03-10
- Langue: Anglais
- This engrossing book explores the profound implications of personal information on the Internet, preserved forever even if it is false, biased, or humiliating....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
18,52 $ ou gratuit avec l'essai de 30 jours
-
-
-
Cyber Warfare in 2022
- Attack Techniques and Espionage Tactics of Cybercrime Groups and Nationstates
- Auteur(s): Michael A. Goedeker MSc
- Narrateur(s): Mandy Grant-Grierson
- Durée: 3 h et 19 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
It’s 2022. Do you know if your online information is safe? According to a study by the University of Maryland, hackers attack internet-connected computers every 39 seconds. The same technology that’s made information sharing easier has put our privacy at risk more than ever. But it doesn’t stop there. International warfare is now waged on the digital stage, changing how countries influence global conflicts' outcomes. We live in an era of computers, data, and digital connections. This book will give you a better understanding of the current threats and solutions from the world of cyber warfare.
-
Cyber Warfare in 2022
- Attack Techniques and Espionage Tactics of Cybercrime Groups and Nationstates
- Narrateur(s): Mandy Grant-Grierson
- Durée: 3 h et 19 min
- Date de publication: 2023-11-18
- Langue: Anglais
-
We live in an era of computers, data, and digital connections. This book will give you a better understanding of the current threats and solutions from the world of cyber warfare....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
10,09 $ ou gratuit avec l'essai de 30 jours
-
-
-
Sinister Shackles
- Understanding Ransomware: Data Encryption and Extortion
- Auteur(s): Logan Lockwood
- Narrateur(s): Sean P. Chapman
- Durée: 1 h et 39 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
Arm yourself with proactive measures and best practices to fortify your defenses. With this invaluable knowledge, you will be equipped to safeguard your organization and ensure its resilience in the face of this ever-present danger. The time to act is now—protect your business from the relentless onslaught of ransomware and its sinister shackles.
-
Sinister Shackles
- Understanding Ransomware: Data Encryption and Extortion
- Narrateur(s): Sean P. Chapman
- Durée: 1 h et 39 min
- Date de publication: 2023-08-14
- Langue: Anglais
-
Arm yourself with proactive measures and best practices to fortify your defenses. With this invaluable knowledge, you will be equipped to safeguard your organization and ensure its resilience in the face of this ever-present danger....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
8,71 $ ou gratuit avec l'essai de 30 jours
-
-
-
Cybersecurity Hackers Among Us
- Cybersecurity Tips Now More Than Ever Before, It's Essential to Keep Your Data Safe from Hackers
- Auteur(s): Tom Brooks
- Narrateur(s): Tom Brooks
- Durée: 2 h et 6 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
Cybersecurity experts agree: No one security measure is foolproof to defend against attacks. Ransomware is a new threat. It comes from nowhere and can potentially lock you out of your data and applications until a ransom is paid, making it difficult to recover. These cybercriminals are extremely skilled and motivated. They want to access as much confidential personal information as possible. Security specialists recommend using every tool at your disposal, including draconian measures like backups, encrypting data files, redacting sensitive information on your devices and firewalls.
-
Cybersecurity Hackers Among Us
- Cybersecurity Tips Now More Than Ever Before, It's Essential to Keep Your Data Safe from Hackers
- Narrateur(s): Tom Brooks
- Durée: 2 h et 6 min
- Date de publication: 2022-01-14
- Langue: Anglais
-
Cybersecurity is a silent war we cannot lose. What we face today is not a cyber war but a cyber battle. A battle that has been going on for the last couple of decades....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
8,71 $ ou gratuit avec l'essai de 30 jours
-
-
-
Hackable
- How to Do Application Security Right
- Auteur(s): Ted Harrington
- Narrateur(s): Arthur Rowan
- Durée: 5 h et 49 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
If you don't fix your security vulnerabilities, attackers will exploit them. It's simply a matter of who finds them first. If you fail to prove that your software is secure, your sales are at risk too. Whether you're a technology executive, developer, or security professional, you are responsible for securing your application.
-
Hackable
- How to Do Application Security Right
- Narrateur(s): Arthur Rowan
- Durée: 5 h et 49 min
- Date de publication: 2021-06-16
- Langue: Anglais
-
If you don't fix your security vulnerabilities, attackers will exploit them. It's simply a matter of who finds them first. If you fail to prove that your software is secure, your sales are at risk too....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
25,00 $ ou gratuit avec l'essai de 30 jours
-
-
-
Censorship's Grave
- Observations, Tools, and Tips for Taking the Internet Back from Autocracies
- Auteur(s): Philip Collier
- Narrateur(s): Philip G Collier
- Durée: 4 h et 5 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
Censorship's Grave looks at modern methods of circumventing censorship and counteracting effects of information warfare. It argues that autocrats are losing the battle of censorship in an information age they no longer control. Unfortunately, the new information age contains a spectrum of arguments - from truth to blatant lies. The book was written by an author who has traveled extensively in countries with restricted media and used circumvention tools in all of them. It conveys a warning to not trade one disinfo system for another one.
-
Censorship's Grave
- Observations, Tools, and Tips for Taking the Internet Back from Autocracies
- Narrateur(s): Philip G Collier
- Durée: 4 h et 5 min
- Date de publication: 2023-05-11
- Langue: Anglais
-
Censorship's Grave looks at modern methods of circumventing censorship and counteracting effects of information warfare. It argues that autocrats are losing the battle of censorship in an information age they no longer control.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
18,74 $ ou gratuit avec l'essai de 30 jours
-
-
-
Cyber Security
- How to Protect Your Digital Life, Avoid Identity Theft, Prevent Extortion, and Secure Your Social Privacy in 2020 and Beyond
- Auteur(s): Matt Reyes
- Narrateur(s): Duke Holm
- Durée: 3 h et 12 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
Cyber attacks are a growing problem that’s affecting an increasing number of devices and people. The current numbers are staggering. Hackers create and deploy over 300,000 new malware programs every single day on networks, individual computers, and other devices. And there are nearly half a million ransomware attacks every year.
-
Cyber Security
- How to Protect Your Digital Life, Avoid Identity Theft, Prevent Extortion, and Secure Your Social Privacy in 2020 and Beyond
- Narrateur(s): Duke Holm
- Durée: 3 h et 12 min
- Date de publication: 2019-11-14
- Langue: Anglais
-
Cyber attacks are a growing problem that’s affecting an increasing number of devices and people. The current numbers are staggering. Hackers create and deploy over 300,000 new malware programs every single day on networks, individual computers, and other devices....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
15,10 $ ou gratuit avec l'essai de 30 jours
-
-
-
Cyber Security
- The Beginners Guide to Learning the Basics of Information Security and Modern Cyber Threats
- Auteur(s): Noah Zhang
- Narrateur(s): Gary Westphalen
- Durée: 2 h et 1 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
Cyber security is here to stay. Do you often wonder how cyber security applies to your everyday life, what’s at risk, and how can you specifically lock down your devices and digital trails to ensure you are now “hacked”? Our society has become saturated with internet-connected devices and trackers everywhere. From home routers to your mobile phones, most people are easily hacked if targeted. In this introductory audiobook, we will cover verified steps and tactics on how to increase the level of cyber security in an organization and as an individual.
-
Cyber Security
- The Beginners Guide to Learning the Basics of Information Security and Modern Cyber Threats
- Narrateur(s): Gary Westphalen
- Durée: 2 h et 1 min
- Date de publication: 2019-10-17
- Langue: Anglais
-
Cyber security is here to stay. Do you often wonder how cyber security applies to your everyday life, what’s at risk, and how can you specifically lock down your devices and digital trails to ensure you are now “hacked”? Listen to find out more....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
8,71 $ ou gratuit avec l'essai de 30 jours
-
-
-
Cloud Security Career Handbook
- A Beginner's Guide to Starting and Succeeding in Cloud Security
- Auteur(s): Timothy Isle
- Narrateur(s): Brent Caraway
- Durée: 2 h et 45 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
Cloud security is one of the hottest fields around, with the global cloud market expected to become a multi-billion-dollar industry by 2030. The demand for cloud security professionals is at an all-time high, and now is the best time to take that next step in your cybersecurity career!
-
Cloud Security Career Handbook
- A Beginner's Guide to Starting and Succeeding in Cloud Security
- Narrateur(s): Brent Caraway
- Durée: 2 h et 45 min
- Date de publication: 2023-06-14
- Langue: Anglais
-
Cloud security is one of the hottest fields around, with the global cloud market expected to become a multi-billion-dollar industry by 2030. The demand for cloud security professionals is at an all-time high, and now is the best time to take that next step in your cybersecurity career....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
8,71 $ ou gratuit avec l'essai de 30 jours
-
-
-
Exploding Data
- Reclaiming Our Cyber Security in the Digital Age
- Auteur(s): Michael Chertoff
- Narrateur(s): Jonathan Yen
- Durée: 6 h et 47 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
In this bracing book, Michael Chertoff makes clear that our laws and policies surrounding the protection of personal information, written for an earlier time, need to be completely overhauled in the Internet era. In offering his compelling call for action, Chertoff argues that what is at stake is not so much the simple loss of privacy, which is almost impossible to protect, but of individual autonomy - the ability to make personal choices free of manipulation or coercion.
-
Exploding Data
- Reclaiming Our Cyber Security in the Digital Age
- Narrateur(s): Jonathan Yen
- Durée: 6 h et 47 min
- Date de publication: 2018-09-19
- Langue: Anglais
-
In this bracing book, Michael Chertoff makes clear that our laws and policies surrounding the protection of personal information, written for an earlier time, need to be completely overhauled in the Internet era....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
22,26 $ ou gratuit avec l'essai de 30 jours
-
-
-
Cybersecurity for Entrepreneurs: Safeguarding Your Business from Online Threats
- Empowering Small Businesses
- Auteur(s): Kimberly Burk Cordova
- Narrateur(s): Hannah Stone
- Durée: 3 h et 15 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
Cybersecurity for Entrepreneurs is your essential guide to understanding and defending your business from the ever-evolving landscape of online threats. Written specifically for small business owners and entrepreneurs, this book simplifies complex cybersecurity concepts and equips you with practical strategies to safeguard your operations, data, and reputation.
-
Cybersecurity for Entrepreneurs: Safeguarding Your Business from Online Threats
- Empowering Small Businesses
- Narrateur(s): Hannah Stone
- Durée: 3 h et 15 min
- Date de publication: 2024-07-10
- Langue: Anglais
-
Cybersecurity for Entrepreneurs is your essential guide to understanding and defending your business from the ever-evolving landscape of online threats.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
18,74 $ ou gratuit avec l'essai de 30 jours
-